• Title/Summary/Keyword: Online Information Privacy Concerns

Search Result 54, Processing Time 0.024 seconds

Analysis of Privacy Violation Possibility of Partially Anonymized Big Data (온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석)

  • Jung, Kang-soo;Park, Seog;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.665-679
    • /
    • 2018
  • With the development of information and communication technology, especially wireless Internet technology and the spread of smart phones, digital data has increased. As a result, privacy issues which concerns about exposure of personal sensitive information are increasing. In this paper, we analyze the privacy vulnerability of online big data in domestic internet environment, especially focusing on portal service, and propose a measure to evaluate the possibility of privacy violation. For this purpose, we collected about 50 million user posts from the potal service contents and extracted the personal information. we find that potal service user can be identified by the extracted personal information even though the user id is partially anonymized. In addition, we proposed a risk measurement evaluation method that reflects the possibility of personal information linkage between service using partial anonymized ID and personal information exposure level.

The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone (정보시스템 관련 교육의 정도가 보안 우려 및 온라인 거래 의도에 미치는 영향 - 인터넷 이용과 스마트 폰 이용의 비교 분석)

  • Jung, Seung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.145-161
    • /
    • 2012
  • This study aims to explore how the degree of education related to information systems and the Internet literacy affect perceived security risk and how these three variables affect online transaction intention based on the Technology Acceptance Model (TAM). Since using smartphone to purchase necessary products is increasing, the study provided two different cases of using the existing Internet and smartphone to buy products. As a result of an empirical test, the degree of information system education, internet literacy, and perceived security risk had significant effects on online transaction intention mediating perceived usefulness and perceived ease of use. Unlike the expectation, the more people have education related to information systems, the more they have knowledge about hacking or cases of privacy infringement, leading to even more concerns about security, thereby believing the Internet transactions require much effort. The more the education about information system, the more we have concerns about security; therefore, perceived security risk have a positive(+) effect on perceived usefulness not a negative(-) effect. Lastly, while the degree of education related to information systems has relations with the recognition of the usefulness of the Internet transaction, the study showed that there are no relations of recognizing the usefulness and the ease of use of smartphone.

The Moderating Role of Site Usage Experience in Internet Users' Decision on Personal Information Disclosure (개인정보제공 의사결정에 있어서 사이트 이용경험의 조절효과에 대한 연구)

  • Lee, Dong-Joo
    • Informatization Policy
    • /
    • v.19 no.2
    • /
    • pp.21-38
    • /
    • 2012
  • The proliferation of the Internet and the advent of e-commerce have amplified public concerns about privacy. Accordingly, much research effort has been made on the issue. While existing research on online information privacy has usually focused on the examination of antecedents of personal information disclosure, the literature has not paid attention to the potential changes of the antecedents' effects depending on the user's experience of the service. The current study aims to investigate the moderating role of site usage experience in Internet users' decision on personal information disclosure. Specifically, this study considers two types of antecedents of personal information disclosure on a site - the attributes of personal information requested (sensitivity and relevance of information) and the value of the service provided by the site; and examines how the effects of the antecedents on the disclosure intention are affected by the users'experience of the site. Our analysis of the data gathered through a web-based experiment reveals that site usage experience moderates the relationship between the attributes of personal information and disclosure intention. While usage experience attenuates the negative effect of information sensitivity on disclosure intention, it intensifies the positive impact that relevance of information has on disclosure intention. Based on the analysis results, we provide implications for the mitigation of the Internet users' privacy concerns as well as theoretical implications.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Effect of TikTok's Level-specific Recommendation Service on Continuous Use Intention: Focusing on the Privacy Calculation Model (틱톡의 수준별 추천 서비스에 따른 지속적 사용의도에 미치는 영향: 프라이버시계산 모델을 중심으로)

  • Yue Zhang;JeongSuk Jin;Joo-Seok Park
    • Information Systems Review
    • /
    • v.24 no.3
    • /
    • pp.69-91
    • /
    • 2022
  • The video recommendation services help to save the user's information search time in the overflowing online information, and algorithms for more efficient and accurate recommendation are continuously developed. In particular, TikTok has the largest number of users in the short video industry due to its unique recommendation algorithms. In this study, by applying a privacy calculation model, the research tried to compare users' responses to each type of TikTok's recommendation service. Users are well aware of the privacy concerns and benefits of TikTok's recommendation service. Although there is a risk, it was found that users continue to use TikTok's recommendation service because the benefits are greater.

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

Effects of Online Engagement on Uses of Digital Paid Contents (온라인 관여가 디지털 유료 콘텐츠 이용에 미치는 영향)

  • Yang, JungAe;Song, Indeok
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.468-481
    • /
    • 2018
  • This study aims to empirically investigate how users' online engagement behaviors predict their uses of paid contents. To this end, the data from the 2016 Korean Media Panel Survey, which has been conducted annually by the Korea Information Society Development Institute(KISDI), were analyzed. Major findings(N=8.313) were as follows. First, the active type of online engagement(e.g., posting, commenting), which contributes to direct creation of online contents, was the most powerful predictor to explain the DV. On the other hand, relatively passive actions of user engagement(e.g., sharing, endorsing, voting) turned out to have no significant effects on the uses of paid contents, just as personality traits and online privacy concerns did. Based on these results, it is recommended that online contents or platform service providers should try to establish clearly-targeted marketing strategies, after thoroughly collecting and analyzing the data of users' various online behaviors.

The Effect of Product Scarcity and Purchase Behavior in Location-Based Application Services (위치기반 어플리케이션 서비스에서 제품의 희소성과 구매행동과의 영향)

  • Wang Ming;Hyeokjun Kwon;Jaewon Choi
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.209-226
    • /
    • 2018
  • Location-based services have distinctive service characteristics compared to the past online commerce used on the desktop. In any place, mobile communication devices can be used to access online and utilize online shopping, and it is more convenient for users. In addition, by providing shopping and service information specific to each location, it is possible to provide convenience to the consumers according to their locations. In addition, it provides scarcity of information as well as location, thereby increasing consumers' desire to purchase. In this study, we investigated the effect of scarcity on the Purchase intention of consumers in location-based services. The steps of scarcity are: first, a step without scarcity, Second, providing time limit information, Third, providing quantity limitation information, Fourth, the experiment was designed to provide time and quantity limitation, and 4 groups were analyzed through experimental stimuli The purpose of this study is to verify the moderating effect of the dependent variable on the degree of scarcity by adding 'ubiquity', 'interactivity' and 'privacy' which are characteristics of location-based service. As a result of the analysis, scarcity of time and scarcity of quantity limitation scarcity stimuli showed a moderating effect on ubiquity, interactivity and consumer's purchase intention, and these variables also directly or indirectly affected positively. Consumer confidence was found to have a negative effect on consumers' purchase intentions.

The Impact of Customer Regulatory Focus and Familiarity with Generative AI-based Chatbot on Self-Disclosure Intentions: Focusing on Privacy Calculus Theory (고객의 조절초점 성향과 생성형 AI 기반 챗봇에 대한 친숙도가 개인정보 제공의도에 미치는 영향: 프라이버시 계산이론을 중심으로)

  • Eun Young Park
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.49-68
    • /
    • 2024
  • Increasing concerns regarding personal data privacy have complicated the acquisition of customer data through online marketing. This study investigates factors influencing customers' willingness to disclose information via a generative AI-based chatbot. Drawing on privacy calculus theory and regulatory focus theory, we explore how customer regulatory focus and familiarity with the generative AI-based chatbot shape disclosure intentions. Our study, involving 473 participants, reveals that low familiarity with the chatbot leads individuals with a prevention focus to perceive higher privacy risks and lower perceived usefulness compared to those with a promotion focus. However, with high familiarity, these differences diminish. Moreover, individuals with a promotion focus show a greater inclination to disclose information when familiarity with the generative AI-based chatbot is low, whereas this regulatory focus does not significantly impact disclosure intentions when familiarity is high. Perceived privacy risks mediate these relationships, underscoring the importance of understanding familiarity with the generative AI-based chatbot in facilitating personal information disclosure.

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.